Feasibility of biosorbent of England bamboo plant origin was tested for removal of priority metal ions such as Cu and Zn from aqueous solutions in single metal state. Batch single metal state experiments were performed to determine the effect of dosage (0.5, 1 and 1.5 g), pH (3, 4, 4.5, 5 and 6), mixing speed (90, 111, 131, 156 and 170 rpm), temperature (20, 25, 30 and 35 °C) and metal ion concentration (10, 50, 70, 90 and 100 mg/L) on the ability of dried biomass to remove metal from solutions which were investigated. Dried powder of bamboo removed (for single metal state) about 74 % Cu and 69% Zn and maximum uptake of Cu and Zn was 7.39 mg/g and 6.96 mg/g respectively, from 100 mg/L of synthetic metal solution in 120 min. of contact time at pH 4.5 and 25°C with continuous stirring at 170 rpm. Experimental results have been analyzed using Langmuir and Freundlich isotherms. Both equilibrium sorption isotherms were found to represent well the measured sorption data, but Freundlich isotherm was better than Langmuir isotherm. The effect of time was studied and the rate of removal of Cu (II) and Zn (II) ions from aqueous solution by bamboo plant was found. The rates of sorption of copper and zinc were rapid initially within 5-15 minutes and reached a maximum in about 60 minutes.
This research is concerned with a new type of ferrocement characterized by its lower density and enhanced thermal insulation. Lightweight ferrocement plates have many advantages, low weight, low cost, thermal insulation, environmental conservation. This work contain two group experimental : first different of layer ferrocement, second different of ratio aggregate to cement. The experiments were made to determined the optimum proportion of cement and lightweight aggregate (recycle thermestone ). A low W/C ratio of 0.4 was used with super plasticizer conforming to ASTM 494 Type G. The compressive strength of the mortar mixes is 20-25 MPa. The work also involved the determination of thermal properties .Thermal conductivity value of thi
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show More